Hongzhou Sha

According to our database1, Hongzhou Sha authored at least 6 papers between 2013 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Limited Dictionary Builder: An approach to select representative tokens for malicious URLs detection.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2014
RAMID: A Novel Risk Assessment Model of Information Dissemination on Social Network.
Proceedings of the Trustworthy Computing and Services - International Conference, 2014

Self-Adaptive Frequency Scaling Architecture for Intrusion Detection System.
Proceedings of the Trustworthy Computing and Services - International Conference, 2014

GuidedTracker: Track the victims with access logs to finding malicious web pages.
Proceedings of the IEEE Global Communications Conference, 2014

2013
EPLogCleaner: Improving Data Quality of Enterprise Proxy Logs for Efficient Web Usage Mining.
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013

A New Approach to Decrease Invalidate Rate of Weak Consistency Methods in Web Proxy Caching.
Proceedings of the Trustworthy Computing and Services, 2013


  Loading...